Chapter 29 Structure of Computer Names Domain Names Within an Organization The DNS Client-Server Model The DNS Server Hierarchy Resolving a Name Optimization.

Slides:



Advertisements
Similar presentations
Basic Communication on the Internet:
Advertisements

Introduction to Networks
Applications:Electronic Mail (SMTP, POP, IMAP, MIME) (Chapter 27) : Presented By : Subhendu Mahanta. Purvi Shah. Jenni Bhatia. Della Nair. Nafiza Islam.
28.2 Functionality Application Software Provides Applications supply the high-level services that user access, and determine how users perceive the capabilities.
The Application Layer Chapter 7. Where are we now?
Distributed Computing. Spring 2002Computer Networks Applications Networking Master-slave: A large, central computer controls small I/O devices Peer-to-peer.
Jaringan Komputer Dasar
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
Naming With the Domain Name System. Why Not Names? Requires more memory to store Requires more computation to manipulate.
CS335 Networking & Network Administration Wednesday, May 26, 2010.
Electronic Mail. Functionality First software allowed a user to send some text to another user connected to Internet; Current systems allow.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Chapter 19 Binding Protocol Addresses (ARP) Chapter 20 IP Datagrams and Datagram Forwarding.
COS 420 DAY 25. Agenda Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due May 10 Today we will discuss.
Chapter 30 Electronic Mail Representation & Transfer
Dave Roberts.  Dynamic Host Configuration Protocol  DHCP  Simple Mail Transport Protocol  SMTP 2.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: Application Layer Network Basics.
Applications:Electronic Mail (SMTP,POP,IMAP,MIME) Presented by-Tarun Lall Badrinath Sai Kumar Praveen.
Architecture of SMTP, POP, IMAP, MIME.
Electronic Mail (SMTP, POP, IMAP, MIME)
1 What is Electronic Mail Exchanging information via computer networks Electronic mail addresses SMTP (Simple Mail Transfer Protocol) Client/Server based.
1 Application Layer Lecture 5 Imran Ahmed University of Management & Technology.
1 Chapter Internet Applications (DNS, )
1 Naming with the Domain Name System. 2 Internet Applications Domain Name System Electronic mail IP telephony Remote login File transfer All use client-server.
1 Chapter Internet Applications (DNS, )
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Chapter 7: Internet-Based Applications Business Data Communications, 6e.
1 Computer Communication & Networks Lecture 27 Application Layer: Electronic mail and FTP Waleed.
Fall 2005 By: H. Veisi Computer networks course Olum-fonoon Babol Chapter 7 The Application Layer.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Internet Applications  DNS   TELNET  FTP  Web browsing.
Electronic Mail Originally –Memo sent from one user to another Now –Memo sent to one or more mailboxes Mailbox –Destination point for messages.
1 Applications Electronic Mail. 2 Electronic Mail Many user applications use client-server architecture. Electronic mail client accepts mail.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
思科网络技术学院理事会. 1 Application Layer Functionality and Protocols Network Fundamentals – Chapter 3.
WXET1143 Lecture7: , Chat and Messaging. Introduction  Electronic mail is everywhere.  Now many people in business, government, and education use.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 3.1 Internet Applications Ch. 31,32,34 (DNS, , TELNET, FTP)
CPT 499 Internet Skills for Educators Electronic Mail Session Five.
TELE202 Lecture 16 Internet applications (1) 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Socket programming »Source: chapter 17 ¥This Lecture »Internet.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
CH2 System models.
(or ?) Short for Electronic Mail The transmission of messages over networks.
15 Semester 1 JEOPARDY IndirectnetworksupportDNSDNSNetworkApps.NetworkApps.MoreNetworkApps.Misc.Misc
1 Applications Computer Networks. 2 Where are we?
Chapter 29 Domain Name System (DNS) Allows users to reference computer names via symbolic names translates symbolic host names into associated IP addresses.
1 Blackboard To Log In: Go To: Click On: Login Username: Firstname.Lastname Password: Last 4 digits of S.S. # View often for.
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
CMPE 80N - Introduction to Networks and the Internet 1 Client-Server Architecture Client Server request response.
Data Communications and Networks Chapter 5 – Network Services DNS, DHCP, FTP and SMTP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
Lecture 6: Sun: 8/5/1435 Distributed Applications Lecturer/ Kawther Abas CS- 492 : Distributed system & Parallel Processing.
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
TCP/IP (Transmission Control Protocol / Internet Protocol)
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
Chapter 20 - Electronic Mail Introduction Description Of Functionality –send a single message to many recipients. –send a message that includes text, voice,
Chapter 16: Distributed Applications Business Data Communications, 4e.
CS440 Computer Networks 1 Neil Tang 12/01/2008.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
1 Kyung Hee University Chapter 22 Simple Mail Transfer Protocol (SMTP)
Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education.
1 Chapter 10: Application Layer Reference: Chapter 7 - “Computer Networks”, Andrew S. Tanenbaum, 4th Edition, Prentice Hall, 2003.
درس مهندسی اینترنت – مهدی عمادی مهندسی اینترنت برنامه‌نویسی در اینترنت 1 SMTP, FTP.
© MMII JW RyderCS 428 Computer Networks1 Electronic Mail  822, SMTP, MIME, POP  Most widely used application service  Sometimes only way a person ever.
Applications:Electronic Mail (SMTP,POP,IMAP,MIME)
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Chapter 10: Application Layer
Web Development & Design Chapter 1, Sections 4, 5 & 6
William Stallings Data and Computer Communications
Computer Networks Protocols
Presentation transcript:

Chapter 29 Structure of Computer Names Domain Names Within an Organization The DNS Client-Server Model The DNS Server Hierarchy Resolving a Name Optimization of DNS Performance

Introduction Computers are assigned symbolic names –Convenient for humans –Inconvenient for computers IP addresses require less computation IP addresses require less memory and time to transmit Symbolic names need to be translated into equivalent IP addresses

Introduction Domain names are used in the Web and for The URL contains the domain name calpoly.eduhttp:// Everytime you use a domain name, you use the internet’s domain name servers to translate it into an IP address

Structure of Computer Names Naming scheme used in the Internet is called DNS(Domain Name System) Each computer name consists of a sequence of alpha- numeric segments separated by periods –Ex. Mordred.cs.purdue.edu Domain names are arranged in a hierarchy –Most significant is on the right –Left most segment is the name of the computer –Other segments identify the group that owns the name

Each organization chooses structure of computer name Most significant segment is called the top level of the DNS

Structure of Computer Names Continued ICANN(Internet Corporation for Assigned Names and Numbers) is the organization that is responsible for domain names To obtain a domain name, each organization has to apply for a name under one of the top-level domains Once an organization has been assigned a domain, the suffix is reserved for that organization DNS allows organizations to use geographic registration –Ex., cnri.reston.va.us –Ex., ac.uk

Domain Names Within an Organization Once an organization owns a domain, the organization can decide whether to introduce hierarchical structure

DNS Server Client Model DNS is autonomous Organizations that have an Internet connection runs a domain server Software that translates computer names into addresses demonstrates the use of client-server interaction –Whenever an application program needs to translate a name, the application become a client of the naming system –Client places the name to be translated in a DNS request message and sends it to the DNS server –Server extracts the names, translates it, and returns the resulting address in a reply message

DNS Server Hierarchy DNS Servers are arranged in a hierarchy that matches the naming hierarchy Root server occupies the top of the hierarchy and is an authority for the top-level domains –Root server contains info about how to reach other servers Corporation can choose to place all its domain names in a single server, or it can choose to run several servers

Resolving a Name Software that performs the translation is called resolver software Each resolver is configured with the address of a local domain name server When a request specifies a name for which a server is an authority, the server answers directly, otherwise the server becomes a client of another server

Optimization of DNS Performance DNS that was just described is inefficient 2 primary optimizations –Replication each server is replicated –Caching each server maintains a cache of names

Summary DNS provides an automated mapping b/w computer names and equivalent IP addresses Names are allocated hierarchically, and segments in the name correspond to levels in the hierarchy The client sends a request to its local server, which either answers the request directly or contacts other servers. DNS servers use two performance optimization techniques: replication and caching

Chapter 30 Electronic Mail Paradigm Electronic Mailboxes and Addresses Electronic Mail Message Format Multipurpose Internet Mail Extensions Mail Transfer SMTP and POP Protocols

Chapter 30 Mail Exploders,lists, and forwarders Mailbox Gateways Mailbox Access

The Electronic Mail Paradigm was designed from the traditional office memo –It was built to allow a person to communicate with other people Electronic mail systems have evolved from the original design and are now permitted to more complex interactions

Electronic Mailboxes and Addresses Before can be sent, the person must be assigned a mailbox address contains 2 parts –Allows each computer system to assign mailbox identifiers independently –Sender’s computer uses the second part to select a destination –Recipient’s computer uses the first part to select a mailbox

Electronic Mail Message Format Message consists of ASCII text that is separated into 2 parts by a blank line –The first part is called the header –The second part is the body

Multipurpose Internet Mail Extensions was designed to handle only text MIME standard allows sender to encode non-text data for transmission –MIME software decodes the attached data automatically For transparent encoding and decoding, MIME adds two lines to an header MIME-Version: 1.0 Content-Type: multipart/mixed;

Mail Transfer A user interacts with an interface –Composing or reading system contains a mail transfer program –Handles the detail of sending message

Simple Mail Transfer Protocol When a transfer mail program contacts a server on a remote machine, it forms a TCP connection over which it communicates Once the connection is in place, SMTP allows the sender to identify itself, specify a recipient, and transfer an

Optimizing For Multiple Recipients Most mail transfer programs are optimized to handle all recipients on a given remote computer at the same time Optimizing reduces –Network bandwidth –Delay required for all users to receive a copy of the message

Mail Exploders,Lists,Forwarders Mail exploder/forwarder-program that forwards copies of a message When an message arrives, the mail exploder examines the destination address

Mail Gateways Mail gateway is a computer dedicated to forwarding

Mailbox Access TCP/IP protocol called POP(Post Office Protocol) allows remote access to an electronic mailbox –The server with the mailbox uses the POP protocol –User runs software that becomes a client of the POP server to access the mailbox

Mailbox Access

Client Example client connects to the SMTP server at openmail2.calpoly.edu client gets the address of the sender and recipient as well as the body of the message from the SMTP server SMTP server at recipient connects with the SMTP server at the sender

Summary Electronic mail uses the office memo paradigm address is separated into 2 parts MIME standard allows a sender to encode non- text data SMTP protocol is used to transfer a message Optimizing for multiple recipients reduces bandwidth and delay Mail exploders make it possible for a large group to communicate via

Summary Mail gateways forward POP protocol used to access a remote mailbox